Which of the following does the administrator need to ensure is in place for a cold site?
A security administrator is in charge of a datacenter, a hot site and a cold site. Due to a recent
disaster, the administrator needs to ensure that their cold site is ready to go in case of a disaster.
Which of the following does the administrator need to ensure is in place for a cold site?
Which of the following is used when performing a qualitative risk analysis?
Which of the following is used when performing a qualitative risk analysis?
Which of the following attack types is MOST likely occurring?
A security administrator performs several war driving routes each month and recently has noticed
a certain area with a large number of unauthorized devices. Which of the following attack types is
MOST likely occurring?
Which of the following could be used to support 802.1x authentication?
A security administrator is setting up a corporate wireless network using WPA2 with CCMP but
does not want to use PSK for authentication. Which of the following could be used to support
802.1x authentication?
Which of the following is the MOST secure method of utilizing FTP?
Which of the following is the MOST secure method of utilizing FTP?
Which of the following BEST describes the information security requirements of a virtualized server?
An administrator is taking an image of a server and converting it to a virtual instance. Which of the
following BEST describes the information security requirements of a virtualized server?
which of the following cloud-based technologies?
Webmail is classified under which of the following cloud-based technologies?
Which of the following would BEST be used to identify the specific computer used by the insider?
Based on logs from file servers, remote access systems, and IDS, a malicious insider was stealing
data using a personal laptop while connected by VPN. The affected company wants access to the
laptop to determine loss, but the insider’s lawyer insists the laptop cannot be identified. Which of
the following would BEST be used to identify the specific computer used by the insider?
Which of the following describes this form of access control?
A security administrator with full administrative rights on the network is forced to temporarily take
time off of their duties. Which of the following describes this form of access control?
Which of the following is the MOST likely cause?
A security engineer is troubleshooting a server in the DMZ, which cannot be reached from the
Internet or the internal network. All other servers on the DMZ are able to communicate with this
server. Which of the following is the MOST likely cause?